Required Preparations |
Prepare the key and certificate to use for TLS encrypted communication. Managing and Verifying a Key and Certificate |
1 | In [Key and Certificate Settings], click [Key and Certificate]. The [Key and Certificate Settings] screen is displayed. |
2 | To the right of the key and certificate to use, click [Register Default Key]. When you click the key name (or certificate icon), the certificate details appear. On the certificate details screen, click [Verify Certificate] to verify that the certificate is valid. |
1 | Click [TLS Details] [Edit]. The [Edit TLS Details] screen is displayed. |
2 | Set the usable version and algorithm, and click [OK]. Some combinations of versions and algorithms cannot be used. For the supported combinations of versions and algorithms, see the TLS specifications. TLS [Allowed Versions] Specify the maximum and minimum versions of TLS. [Algorithm Settings] Select the checkbox of the algorithm to use for TLS. |
1 | Click [License/Other] [Remote UI Settings] [Edit]. The [Edit Remote UI Settings] screen is displayed. |
2 | Select the [Use TLS] checkbox, and click [OK]. |
When a Warning Message Appears at Remote UI StartupA warning message about the security certificate may appear when starting up Remote UI with TLS enabled. If there are no problems with the certificate or TLS settings, you can continue operations. Using TLS to Encrypt Sent and Received E-mails and I-FaxesIf the SMTP server and POP3 server support TLS, TLS can be used for communication with these servers. Configuring Detailed Information of the E-mail Server (Remote UI) |